SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   



Category:   Application (Generic)  >   Perl Vendors:   Wall, Larry
Perl UTF-8 Regex Processing Bug Lets Users Deny Service
SecurityTracker Alert ID:  1023077
SecurityTracker URL:  https://securitytracker.com/id/1023077
CVE Reference:   CVE-2009-3626   (Links to External Site)
Updated:  Oct 31 2009
Original Entry Date:  Oct 26 2009
Impact:   Denial of service via local system, Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 5.10.1
Description:   A vulnerability was reported in Perl. A remote or local user can cause denial of service conditions.

A user can create a specially crafted UTF-8 code that, when processed by the regular expression parser, will cause the parser to crash.

Mark Martinec reported this vulnerability.

Impact:   A remote or local user can cause denial of service conditions. The specific impact depends on the application that uses perl.
Solution:   The vendor has issued a source code fix, available via GIT at:

http://perl5.git.perl.org/perl.git/commitdiff/0abd0d78a73da1c4d13b1c700526b7e5d03b32d4

Vendor URL:  cpan.org/ (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search


Content previously copyright SecurityGlobal.net LLC placed in the public domain on December 31, 2019.